Search dblp for Publications

export results for "toc:db/journals/dcc/dcc73.bht:"

 download as .bib file

@article{DBLP:journals/dcc/Adhikari14,
  author       = {Avishek Adhikari},
  title        = {Linear algebraic techniques to construct monochrome visual cryptographic
                  schemes for general access structure and its applications to color
                  images},
  journal      = {Des. Codes Cryptogr.},
  volume       = {73},
  number       = {3},
  pages        = {865--895},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-013-9832-5},
  doi          = {10.1007/S10623-013-9832-5},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Adhikari14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/AndersonM14,
  author       = {Sarah E. Anderson and
                  Gretchen L. Matthews},
  title        = {Exponents of polar codes using algebraic geometric code kernels},
  journal      = {Des. Codes Cryptogr.},
  volume       = {73},
  number       = {2},
  pages        = {699--717},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-014-9987-8},
  doi          = {10.1007/S10623-014-9987-8},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/AndersonM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BalletR14,
  author       = {St{\'{e}}phane Ballet and
                  Robert Rolland},
  title        = {On low weight codewords of generalized affine and projective Reed-Muller
                  codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {73},
  number       = {2},
  pages        = {271--297},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-013-9911-7},
  doi          = {10.1007/S10623-013-9911-7},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BalletR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Ballico14,
  author       = {Edoardo Ballico},
  title        = {Any network code comes from an algebraic curve taking osculating spaces},
  journal      = {Des. Codes Cryptogr.},
  volume       = {73},
  number       = {3},
  pages        = {1023--1026},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-013-9841-4},
  doi          = {10.1007/S10623-013-9841-4},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Ballico14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BlondeauP14,
  author       = {C{\'{e}}line Blondeau and
                  L{\'{e}}o Perrin},
  title        = {More differentially 6-uniform power functions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {73},
  number       = {2},
  pages        = {487--505},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-014-9948-2},
  doi          = {10.1007/S10623-014-9948-2},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BlondeauP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Broughton14,
  author       = {Wayne Broughton},
  title        = {Admissible parameters of symmetric designs satisfying {\textdollar}{\textdollar}v=4(k-{\textbackslash}lambda
                  )+2{\textdollar}{\textdollar} and symmetric designs with inner balance},
  journal      = {Des. Codes Cryptogr.},
  volume       = {73},
  number       = {1},
  pages        = {77--83},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-013-9810-y},
  doi          = {10.1007/S10623-013-9810-Y},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Broughton14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BudaghyanHP14,
  author       = {Lilya Budaghyan and
                  Tor Helleseth and
                  Matthew Geoffrey Parker},
  title        = {Editorial: special issue on coding and cryptography},
  journal      = {Des. Codes Cryptogr.},
  volume       = {73},
  number       = {2},
  pages        = {269},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-014-9995-8},
  doi          = {10.1007/S10623-014-9995-8},
  timestamp    = {Wed, 01 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BudaghyanHP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BulyginWB14,
  author       = {Stanislav Bulygin and
                  Michael Walter and
                  Johannes Buchmann},
  title        = {Full analysis of PRINTcipher with respect to invariant subspace attack:
                  efficient key recovery and countermeasures},
  journal      = {Des. Codes Cryptogr.},
  volume       = {73},
  number       = {3},
  pages        = {997--1022},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-013-9840-5},
  doi          = {10.1007/S10623-013-9840-5},
  timestamp    = {Mon, 16 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/BulyginWB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CaoH14,
  author       = {Weiwei Cao and
                  Lei Hu},
  title        = {Projective interpolation of polynomial vectors and improved key recovery
                  attack on {SFLASH}},
  journal      = {Des. Codes Cryptogr.},
  volume       = {73},
  number       = {3},
  pages        = {719--730},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-013-9819-2},
  doi          = {10.1007/S10623-013-9819-2},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/CaoH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CarletK14,
  author       = {Claude Carlet and
                  Andrew Klapper},
  title        = {On the arithmetic Walsh coefficients of Boolean functions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {73},
  number       = {2},
  pages        = {299--318},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-013-9915-3},
  doi          = {10.1007/S10623-013-9915-3},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/CarletK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Caullery14,
  author       = {Florian Caullery},
  title        = {A new large class of functions not {APN} infinitely often},
  journal      = {Des. Codes Cryptogr.},
  volume       = {73},
  number       = {2},
  pages        = {601--614},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-014-9956-2},
  doi          = {10.1007/S10623-014-9956-2},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Caullery14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ChenLLSW14,
  author       = {Jie Chen and
                  Hoon Wei Lim and
                  San Ling and
                  Le Su and
                  Huaxiong Wang},
  title        = {Spatial encryption supporting non-monotone access structure},
  journal      = {Des. Codes Cryptogr.},
  volume       = {73},
  number       = {3},
  pages        = {731--746},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-013-9823-6},
  doi          = {10.1007/S10623-013-9823-6},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ChenLLSW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ChenLLWW14,
  author       = {Jie Chen and
                  Hoon Wei Lim and
                  San Ling and
                  Huaxiong Wang and
                  Hoeteck Wee},
  title        = {Shorter identity-based encryption via asymmetric pairings},
  journal      = {Des. Codes Cryptogr.},
  volume       = {73},
  number       = {3},
  pages        = {911--947},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-013-9834-3},
  doi          = {10.1007/S10623-013-9834-3},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ChenLLWW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ChigiraHK14,
  author       = {Naoki Chigira and
                  Masaaki Harada and
                  Masaaki Kitazume},
  title        = {On the classification of extremal doubly even self-dual codes with
                  2-transitive automorphism groups},
  journal      = {Des. Codes Cryptogr.},
  volume       = {73},
  number       = {1},
  pages        = {33--35},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-013-9807-6},
  doi          = {10.1007/S10623-013-9807-6},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ChigiraHK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CossidenteP14,
  author       = {Antonio Cossidente and
                  Francesco Pavese},
  title        = {New infinite families of hyperovals on {\textdollar}{\textdollar}{\textbackslash}mathcal
                  {H} (3, q2), q{\textdollar}{\textdollar} {H} {(} 3 , q 2 {)} , q odd},
  journal      = {Des. Codes Cryptogr.},
  volume       = {73},
  number       = {1},
  pages        = {217--222},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-013-9818-3},
  doi          = {10.1007/S10623-013-9818-3},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/CossidenteP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CouvreurGGOT14,
  author       = {Alain Couvreur and
                  Philippe Gaborit and
                  Val{\'{e}}rie Gauthier{-}Uma{\~{n}}a and
                  Ayoub Otmani and
                  Jean{-}Pierre Tillich},
  title        = {Distinguisher-based attacks on public-key cryptosystems using Reed-Solomon
                  codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {73},
  number       = {2},
  pages        = {641--666},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-014-9967-z},
  doi          = {10.1007/S10623-014-9967-Z},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/CouvreurGGOT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/DoughertyS14,
  author       = {Steven T. Dougherty and
                  Eseng{\"{u}}l Salt{\"{u}}rk},
  title        = {Counting codes over rings},
  journal      = {Des. Codes Cryptogr.},
  volume       = {73},
  number       = {1},
  pages        = {151--165},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-013-9815-6},
  doi          = {10.1007/S10623-013-9815-6},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/DoughertyS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Dubrova14,
  author       = {Elena Dubrova},
  title        = {Generation of full cycles by a composition of NLFSRs},
  journal      = {Des. Codes Cryptogr.},
  volume       = {73},
  number       = {2},
  pages        = {469--486},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-014-9947-3},
  doi          = {10.1007/S10623-014-9947-3},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Dubrova14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/FangC14,
  author       = {Jianying Fang and
                  Yanxun Chang},
  title        = {Mutually disjoint t-designs and t-SEEDs from extremal doubly-even
                  self-dual codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {73},
  number       = {3},
  pages        = {769--780},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-013-9825-4},
  doi          = {10.1007/S10623-013-9825-4},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/FangC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/FangZC14,
  author       = {Jianying Fang and
                  Junling Zhou and
                  Yanxun Chang},
  title        = {Nonexistence of some quantum jump codes with specified parameters},
  journal      = {Des. Codes Cryptogr.},
  volume       = {73},
  number       = {1},
  pages        = {223--235},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-013-9814-7},
  doi          = {10.1007/S10623-013-9814-7},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/FangZC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/FengHLG14,
  author       = {Tao Feng and
                  Sihuang Hu and
                  Shuxing Li and
                  Gennian Ge},
  title        = {Difference sets with few character values},
  journal      = {Des. Codes Cryptogr.},
  volume       = {73},
  number       = {3},
  pages        = {825--839},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-013-9830-7},
  doi          = {10.1007/S10623-013-9830-7},
  timestamp    = {Tue, 22 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/FengHLG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Fontein0W14,
  author       = {Felix Fontein and
                  Michael Schneider and
                  Urs Wagner},
  title        = {PotLLL: a polynomial time version of {LLL} with deep insertions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {73},
  number       = {2},
  pages        = {355--368},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-014-9918-8},
  doi          = {10.1007/S10623-014-9918-8},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Fontein0W14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/GavrilyukM14,
  author       = {Alexander L. Gavrilyuk and
                  Ivan Yu. Mogilnykh},
  title        = {Cameron-Liebler line classes in PG(n, 4)},
  journal      = {Des. Codes Cryptogr.},
  volume       = {73},
  number       = {3},
  pages        = {969--982},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-013-9838-z},
  doi          = {10.1007/S10623-013-9838-Z},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/GavrilyukM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Geil14,
  author       = {Olav Geil},
  title        = {Erratum to: On the second weight of generalized Reed-Muller codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {73},
  number       = {1},
  pages        = {267},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-014-9966-0},
  doi          = {10.1007/S10623-014-9966-0},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Geil14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/GrozaW14,
  author       = {Bogdan Groza and
                  Bogdan Warinschi},
  title        = {Cryptographic puzzles and DoS resilience, revisited},
  journal      = {Des. Codes Cryptogr.},
  volume       = {73},
  number       = {1},
  pages        = {177--207},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-013-9816-5},
  doi          = {10.1007/S10623-013-9816-5},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/GrozaW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/HerranzRS14a,
  author       = {Javier Herranz and
                  Alexandre Ruiz and
                  Germ{\'{a}}n S{\'{a}}ez},
  title        = {New results and applications for multi-secret sharing schemes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {73},
  number       = {3},
  pages        = {841--864},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-013-9831-6},
  doi          = {10.1007/S10623-013-9831-6},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/HerranzRS14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/HoriguchiMN14a,
  author       = {Naoyuki Horiguchi and
                  Tsuyoshi Miezaki and
                  Hiroyuki Nakasora},
  title        = {Erratum to: On the support designs of extremal binary doubly even
                  self-dual codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {73},
  number       = {3},
  pages        = {1027--1028},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-014-9990-0},
  doi          = {10.1007/S10623-014-9990-0},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/HoriguchiMN14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/HuangL14,
  author       = {Jialin Huang and
                  Xuejia Lai},
  title        = {Revisiting key schedule's diffusion in relation with round function's
                  diffusion},
  journal      = {Des. Codes Cryptogr.},
  volume       = {73},
  number       = {1},
  pages        = {85--103},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-013-9804-9},
  doi          = {10.1007/S10623-013-9804-9},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/HuangL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/JhanwarVS14,
  author       = {Mahabir Prasad Jhanwar and
                  Ayineedi Venkateswarlu and
                  Reihaneh Safavi{-}Naini},
  title        = {Paillier-based publicly verifiable (non-interactive) secret sharing},
  journal      = {Des. Codes Cryptogr.},
  volume       = {73},
  number       = {2},
  pages        = {529--546},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-014-9952-6},
  doi          = {10.1007/S10623-014-9952-6},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/JhanwarVS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/KimT14,
  author       = {Hyun Kwang Kim and
                  Phan Thanh Toan},
  title        = {New inequalities for {\textdollar}{\textdollar}q{\textdollar}{\textdollar}
                  q -ary constant-weight codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {73},
  number       = {2},
  pages        = {369--381},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-014-9924-x},
  doi          = {10.1007/S10623-014-9924-X},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/KimT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/KloveS14,
  author       = {Torleiv Kl{\o}ve and
                  Moshe Schwartz},
  title        = {Linear covering codes and error-correcting codes for limited-magnitude
                  errors},
  journal      = {Des. Codes Cryptogr.},
  volume       = {73},
  number       = {2},
  pages        = {329--354},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-013-9917-1},
  doi          = {10.1007/S10623-013-9917-1},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/KloveS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/KloveS14a,
  author       = {Torleiv Kl{\o}ve and
                  Moshe Schwartz},
  title        = {Erratum to: Linear covering codes and error-correcting codes for limited-magnitude
                  errors},
  journal      = {Des. Codes Cryptogr.},
  volume       = {73},
  number       = {3},
  pages        = {1029},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-014-9991-z},
  doi          = {10.1007/S10623-014-9991-Z},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/KloveS14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/KositwattanarerkO14,
  author       = {Wittawat Kositwattanarerk and
                  Fr{\'{e}}d{\'{e}}rique E. Oggier},
  title        = {Connections between Construction {D} and related constructions of
                  lattices},
  journal      = {Des. Codes Cryptogr.},
  volume       = {73},
  number       = {2},
  pages        = {441--455},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-014-9939-3},
  doi          = {10.1007/S10623-014-9939-3},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/KositwattanarerkO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LandjevV14,
  author       = {Ivan N. Landjev and
                  Peter Vandendriessche},
  title        = {On the rank of incidence matrices in projective Hjelmslev spaces},
  journal      = {Des. Codes Cryptogr.},
  volume       = {73},
  number       = {2},
  pages        = {615--623},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-014-9959-z},
  doi          = {10.1007/S10623-014-9959-Z},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LandjevV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LiSS14,
  author       = {Wenhui Li and
                  Vladimir Sidorenko and
                  Danilo Silva},
  title        = {On transform-domain error and erasure correction by Gabidulin codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {73},
  number       = {2},
  pages        = {571--586},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-014-9954-4},
  doi          = {10.1007/S10623-014-9954-4},
  timestamp    = {Tue, 27 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LiSS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LiTH14,
  author       = {Nian Li and
                  Xiaohu Tang and
                  Tor Helleseth},
  title        = {New {\textdollar}{\textdollar}M{\textdollar}{\textdollar} {M} -ary
                  sequences with low autocorrelation from interleaved technique},
  journal      = {Des. Codes Cryptogr.},
  volume       = {73},
  number       = {1},
  pages        = {237--249},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-013-9821-8},
  doi          = {10.1007/S10623-013-9821-8},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LiTH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LiangLD14,
  author       = {Miao Liang and
                  Mingchao Li and
                  Beiliang Du},
  title        = {A construction for t-fold perfect authentication codes with arbitration},
  journal      = {Des. Codes Cryptogr.},
  volume       = {73},
  number       = {3},
  pages        = {781--790},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-013-9826-3},
  doi          = {10.1007/S10623-013-9826-3},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LiangLD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LieblerP14,
  author       = {Robert A. Liebler and
                  Cheryl E. Praeger},
  title        = {Neighbour-transitive codes in Johnson graphs},
  journal      = {Des. Codes Cryptogr.},
  volume       = {73},
  number       = {1},
  pages        = {1--25},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-014-9982-0},
  doi          = {10.1007/S10623-014-9982-0},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LieblerP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LinJ14,
  author       = {Yiling Lin and
                  Masakazu Jimbo},
  title        = {Extremal properties of t-SEEDs and recursive constructions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {73},
  number       = {3},
  pages        = {805--823},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-013-9829-0},
  doi          = {10.1007/S10623-013-9829-0},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LinJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LisonekL14,
  author       = {Petr Lisonek and
                  Hui Yi Lu},
  title        = {Bent functions on partial spreads},
  journal      = {Des. Codes Cryptogr.},
  volume       = {73},
  number       = {1},
  pages        = {209--216},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-013-9820-9},
  doi          = {10.1007/S10623-013-9820-9},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LisonekL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LisonekS14,
  author       = {Petr Lisonek and
                  Vijaykumar Singh},
  title        = {Quantum codes from nearly self-orthogonal quaternary linear codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {73},
  number       = {2},
  pages        = {417--424},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-014-9934-8},
  doi          = {10.1007/S10623-014-9934-8},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LisonekS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Liu14,
  author       = {Huaning Liu},
  title        = {A family of elliptic curve pseudorandom binary sequences},
  journal      = {Des. Codes Cryptogr.},
  volume       = {73},
  number       = {1},
  pages        = {251--265},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-013-9822-7},
  doi          = {10.1007/S10623-013-9822-7},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Liu14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LiuL14,
  author       = {Xiaogang Liu and
                  Yuan Luo},
  title        = {The weight distributions of some cyclic codes with three or four nonzeros
                  over {\(\mathbb{F}\)}\({}_{\mbox{3}}\)},
  journal      = {Des. Codes Cryptogr.},
  volume       = {73},
  number       = {3},
  pages        = {747--768},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-013-9824-5},
  doi          = {10.1007/S10623-013-9824-5},
  timestamp    = {Tue, 25 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LiuL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LiuPH14,
  author       = {Xing Liu and
                  Daiyuan Peng and
                  Hongyu Han},
  title        = {Low-hit-zone frequency hopping sequence sets with optimal partial
                  Hamming correlation properties},
  journal      = {Des. Codes Cryptogr.},
  volume       = {73},
  number       = {1},
  pages        = {167--176},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-013-9817-4},
  doi          = {10.1007/S10623-013-9817-4},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/LiuPH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LondahlJ14,
  author       = {Carl L{\"{o}}ndahl and
                  Thomas Johansson},
  title        = {Improved algorithms for finding low-weight polynomial multiples in
                  F\({}_{\mbox{2}}\)[x] and some cryptographic applications},
  journal      = {Des. Codes Cryptogr.},
  volume       = {73},
  number       = {2},
  pages        = {625--640},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-014-9960-6},
  doi          = {10.1007/S10623-014-9960-6},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/LondahlJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LuF14,
  author       = {Hui{-}Chuan Lu and
                  Hung{-}Lin Fu},
  title        = {The exact values of the optimal average information ratio of perfect
                  secret-sharing schemes for tree-based access structures},
  journal      = {Des. Codes Cryptogr.},
  volume       = {73},
  number       = {1},
  pages        = {37--46},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-012-9792-1},
  doi          = {10.1007/S10623-012-9792-1},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LuF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/MaZS14,
  author       = {Wenping Ma and
                  Chun'e Zhao and
                  Dongsu Shen},
  title        = {New optimal constructions of conflict-avoiding codes of odd length
                  and weight 3},
  journal      = {Des. Codes Cryptogr.},
  volume       = {73},
  number       = {3},
  pages        = {791--804},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-013-9827-2},
  doi          = {10.1007/S10623-013-9827-2},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/MaZS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Mennink14,
  author       = {Bart Mennink},
  title        = {On the collision and preimage security of {MDC-4} in the ideal cipher
                  model},
  journal      = {Des. Codes Cryptogr.},
  volume       = {73},
  number       = {1},
  pages        = {121--150},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-013-9813-8},
  doi          = {10.1007/S10623-013-9813-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Mennink14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/MomiharaY14,
  author       = {Koji Momihara and
                  Mieko Yamada},
  title        = {Divisible difference families from Galois rings GR(4, n) and Hadamard
                  matrices},
  journal      = {Des. Codes Cryptogr.},
  volume       = {73},
  number       = {3},
  pages        = {897--909},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-013-9833-4},
  doi          = {10.1007/S10623-013-9833-4},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/MomiharaY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Nakashima14,
  author       = {Tohru Nakashima},
  title        = {Construction of codes from Arakelov geometry},
  journal      = {Des. Codes Cryptogr.},
  volume       = {73},
  number       = {1},
  pages        = {47--54},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-013-9809-4},
  doi          = {10.1007/S10623-013-9809-4},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Nakashima14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/NielsenZ14,
  author       = {Johan Sebastian Rosenkilde Nielsen and
                  Alexander Zeh},
  title        = {Multi-trial Guruswami-Sudan decoding for generalised Reed-Solomon
                  codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {73},
  number       = {2},
  pages        = {507--527},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-014-9951-7},
  doi          = {10.1007/S10623-014-9951-7},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/NielsenZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/OngO14,
  author       = {Soon Sheng Ong and
                  Fr{\'{e}}d{\'{e}}rique E. Oggier},
  title        = {Wiretap lattice codes from number fields with no small norm elements},
  journal      = {Des. Codes Cryptogr.},
  volume       = {73},
  number       = {2},
  pages        = {425--440},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-014-9935-7},
  doi          = {10.1007/S10623-014-9935-7},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/OngO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/OzbudakS14,
  author       = {Ferruh {\"{O}}zbudak and
                  Z{\"{u}}lf{\"{u}}kar Saygi},
  title        = {On the exact number of solutions of certain linearized equations},
  journal      = {Des. Codes Cryptogr.},
  volume       = {73},
  number       = {2},
  pages        = {457--468},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-014-9942-8},
  doi          = {10.1007/S10623-014-9942-8},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/OzbudakS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/PirsicW14,
  author       = {Gottlieb Isabel Pirsic and
                  Arne Winterhof},
  title        = {On discrete Fourier transform, ambiguity, and Hamming-autocorrelation
                  of pseudorandom sequences},
  journal      = {Des. Codes Cryptogr.},
  volume       = {73},
  number       = {2},
  pages        = {319--328},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-013-9916-2},
  doi          = {10.1007/S10623-013-9916-2},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/PirsicW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/RaaphorstMS14,
  author       = {Sebastian Raaphorst and
                  Lucia Moura and
                  Brett Stevens},
  title        = {A construction for strength-3 covering arrays from linear feedback
                  shift register sequences},
  journal      = {Des. Codes Cryptogr.},
  volume       = {73},
  number       = {3},
  pages        = {949--968},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-013-9835-2},
  doi          = {10.1007/S10623-013-9835-2},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/RaaphorstMS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/RosenthalST14,
  author       = {Joachim Rosenthal and
                  Natalia Silberstein and
                  Anna{-}Lena Trautmann},
  title        = {On the geometry of balls in the Grassmannian and list decoding of
                  lifted Gabidulin codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {73},
  number       = {2},
  pages        = {393--416},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-014-9932-x},
  doi          = {10.1007/S10623-014-9932-X},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/RosenthalST14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Sarkar14,
  author       = {Santanu Sarkar},
  title        = {Small secret exponent attack on {RSA} variant with modulus N=p\({}^{\mbox{r}}\)q},
  journal      = {Des. Codes Cryptogr.},
  volume       = {73},
  number       = {2},
  pages        = {383--392},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-014-9928-6},
  doi          = {10.1007/S10623-014-9928-6},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Sarkar14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/SchmidtT14,
  author       = {Bernhard Schmidt and
                  Ming Ming Tan},
  title        = {Construction of relative difference sets and Hadamard groups},
  journal      = {Des. Codes Cryptogr.},
  volume       = {73},
  number       = {1},
  pages        = {105--119},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-013-9811-x},
  doi          = {10.1007/S10623-013-9811-X},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/SchmidtT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ShibutaniB14,
  author       = {Kyoji Shibutani and
                  Andrey Bogdanov},
  title        = {Towards the optimality of Feistel ciphers with substitution-permutation
                  functions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {73},
  number       = {2},
  pages        = {667--682},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-014-9970-4},
  doi          = {10.1007/S10623-014-9970-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ShibutaniB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/SoleimanyN14,
  author       = {Hadi Soleimany and
                  Kaisa Nyberg},
  title        = {Zero-correlation linear cryptanalysis of reduced-round LBlock},
  journal      = {Des. Codes Cryptogr.},
  volume       = {73},
  number       = {2},
  pages        = {683--698},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-014-9976-y},
  doi          = {10.1007/S10623-014-9976-Y},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/SoleimanyN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Stichtenoth14,
  author       = {Henning Stichtenoth},
  title        = {A note on composed products of polynomials over finite fields},
  journal      = {Des. Codes Cryptogr.},
  volume       = {73},
  number       = {1},
  pages        = {27--32},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-013-9808-5},
  doi          = {10.1007/S10623-013-9808-5},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Stichtenoth14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Wachter-ZehZ14,
  author       = {Antonia Wachter{-}Zeh and
                  Alexander Zeh},
  title        = {List and unique error-erasure decoding of interleaved Gabidulin codes
                  with interpolation techniques},
  journal      = {Des. Codes Cryptogr.},
  volume       = {73},
  number       = {2},
  pages        = {547--570},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-014-9953-5},
  doi          = {10.1007/S10623-014-9953-5},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Wachter-ZehZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/YankovL14,
  author       = {Nikolay I. Yankov and
                  Moon Ho Lee},
  title        = {New binary self-dual codes of lengths 50-60},
  journal      = {Des. Codes Cryptogr.},
  volume       = {73},
  number       = {3},
  pages        = {983--996},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-013-9839-y},
  doi          = {10.1007/S10623-013-9839-Y},
  timestamp    = {Mon, 30 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/YankovL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/YuWL14,
  author       = {Yuyin Yu and
                  Mingsheng Wang and
                  Yongqiang Li},
  title        = {A matrix approach for constructing quadratic {APN} functions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {73},
  number       = {2},
  pages        = {587--600},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-014-9955-3},
  doi          = {10.1007/S10623-014-9955-3},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/YuWL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ZhouL14,
  author       = {Jianqin Zhou and
                  Wanquan Liu},
  title        = {The {\textdollar}{\textdollar}k{\textdollar}{\textdollar} -error linear
                  complexity distribution for {\textdollar}{\textdollar}2n{\textdollar}{\textdollar}
                  -periodic binary sequences},
  journal      = {Des. Codes Cryptogr.},
  volume       = {73},
  number       = {1},
  pages        = {55--75},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-013-9805-8},
  doi          = {10.1007/S10623-013-9805-8},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ZhouL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics